CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

mba

Results 201 - 225 of 369Sort Results By: Published Date | Title | Company Name
Published By: Oracle Service Cloud     Published Date: Mar 23, 2016
As the undisputed leader in home robots, iRobot has pioneered a completely new market, making it even more important for the company to establish what its customers want quickly, and to deliver outstanding customer-service experiences. To maximize adoption of its new technology, including its best-selling Roomba® vacuuming robots product line, iRobot wanted to optimize its use of multiple communications channels, to listen to its customers’ needs and identify revenue opportunities, while providing exceptional levels of service consistently across Web, social, and traditional channels.
Tags : 
oracle, service cloud, irobot, customer service, customer interaction
    
Oracle Service Cloud
Published By: EADA Business School     Published Date: Apr 10, 2016
In this summary, we set forth a brief introduction to the NeuroTrainingLab methodology and the impact observed on the MILCO and MARD programmes, comparing it to the Executive MBA, measured with the NeuroTrainingLab.
Tags : 
neurotraininglab, higher education, emba, mard, leadership training, talent management, eada, employee performance
    
EADA Business School
Published By: Samuel Curtis Johnson Graduate School of Management     Published Date: Dec 19, 2017
In today’s society, it can be easy to overlook the benefits of earning an MBA. But research shows the benefits of going back to school far outweigh the costs for many individuals.
Tags : 
cornell university, johnson cornell, mba, masters degree, business degree, continuing education, business learning, productivity
    
Samuel Curtis Johnson Graduate School of Management
Published By: Prof. Allan Eberhart, Director of the Georgetown University MSF Program     Published Date: Jan 14, 2018
If you have a passion for business and finance and want to invest in your future career success, many prospective students weigh whether to earn an MBA with a finance concentration from another top university or pursue the Georgetown MSF. At first glance, they may seem like equal substitutions, however there are differences.
Tags : 
georgetown university, mcdonough school of business, master of science in finance, msf, mba, masters in business administration, employee training software, elearning
    
Prof. Allan Eberhart, Director of the Georgetown University MSF Program
Published By: Tenable     Published Date: Apr 30, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Cherwell Software     Published Date: Sep 14, 2016
In this Playbook, we will explore a variety of organizations that have embarked on new ways of using IT Service Management technology to support and accelerate growth. Leaders from top worldwide organizations share how they have extended Cherwell Service Management to manage processes, build inviting customer experiences and accelerate success quickly and efficiently.
Tags : 
    
Cherwell Software
Published By: Simba by Magnitude     Published Date: Jul 12, 2019
Siloed data has become the Achilles heel of marketing insights –especially in the world of B2B and B2B2C marketing. Today’s marketing and sales departments sit on a goldmine of data derived from the dozens of applications and data sources in their MarTech stack. Still, the real opportunity for insights is hidden in the combined data across applications. Combining data in a comprehensive way delivers a full picture of marketing efficacy and efficiency. In this eBook, learn about the origins of siloed data, and how data has emerged and evolved, as well as review the benefits that marketing can realize with connected data. Along the way, we’ll share some action items you can take to assess your current situation and build a plan to unify your data and fuel great marketing insights.
Tags : 
    
Simba by Magnitude
Published By: Simba by Magnitude     Published Date: Sep 20, 2019
Despite the thousands of MarTech solutionsavailable today, we’re stillmissing a comprehensive, connected view of our marketing data.Imagine if we could connect the dots.You know you don’t have the fully integrated picture of your marketing data, but how do you troubleshoot, whom and what should you ask?Here’s a check listof questions and exercises to help you discover your data and process bottlenecks. Are you ready?
Tags : 
    
Simba by Magnitude
Published By: Stratus Technologies     Published Date: Mar 10, 2009
Terry Bass, V Series and OpenVOS Product Manager, discusses the arsenal of industry standard and open source applications available today on OpenVOS that make UNIX and Linux programmers immediately productive on the world’s most reliable operating system. VOS is now OPEN.
Tags : 
stratus, openvos, open source applications, unix, linux, gnu tools, debugging tools, industry standard
    
Stratus Technologies
Published By: IDology     Published Date: Feb 11, 2008
There is a new automated technology available now that is helping businesses combat identity theft and prevent fraud. It is called identity proofing and it is specifically designed to verify consumer identities online. With all the fraud prevention solutions available in the market today you are probably wondering, does my company really need to use an identity proofing solution?
Tags : 
identity management, iam, access management, iam, risk management, identity theft, hackers, fraud
    
IDology
Published By: LANDesk     Published Date: Jun 07, 2010
Windows 7 adoption is one of IT's top priorities for 2010. A solid adoption strategy requires 12 to 18 months for thorough planning and testing before actual Windows 7 deployment can begin. But nearly two-thirds of companies don't yet have a Windows 7 adoption plan in place. In this White Paper LANDesk have identified seven pitfalls that IT organizations must avoid as they embark on Windows 7 adoption.
Tags : 
avocent, landesk, windows 7, microsoft, windows, vista, support, sp2
    
LANDesk
Published By: ESET     Published Date: Jan 21, 2010
Bots and botnets suck, so what better teaching aid to help people understand them than a vacuum cleaner? It can be extremely challenging to attempt to explain technical concepts to non-technical people. There are two goals for this presentation. Click on this white paper to read about it.
Tags : 
eset, internet security, bots, botnets, national cybersecurity alliance, roomba, remote access tool, denial of service attack
    
ESET
Published By: Microsoft Dynamics CRM     Published Date: Mar 30, 2010
As global employment prospects lag behind a slow economic recovery, customers in many parts of the world are more cautious and better informed than ever. They have access to a wealth of information about the products and services they seek, much of it obtained from trusted sources almost immediately. Yet businesses have moved slowly to exploit emerging technologies and information sources like Twitter, Facebook and YouTube. As a result, customers often seem better informed about the products and services they buy than companies are about their customers. This imbalance presents a big challenge to companies struggling to avoid commoditisation and it could grow into a competitive disadvantage as customers demand more personalized service.
Tags : 
microsoft dynamic crm, productivity enhancement, customer service productivity, productivity
    
Microsoft Dynamics CRM
Published By: IBM Software     Published Date: Feb 03, 2012
This paper from IBM describes how to build a proactive threat and risk strategy based on predictive analytics; examples of how organizations used predictive analytics to minimize the negative impact of risk and maximize positive results; and steps to advance your organization's use of predictive analytics to combat threat and risk.
Tags : 
predictive threat, security, technology, risk management, security policy, ibm, intrustion protection, access control
    
IBM Software
Published By: SAS     Published Date: Apr 25, 2017
Physicians and their patients, medical policy makers and licensing boards, pharmaceutical companies and pharmacies all must work together to stem the opioid epidemic and achieve the fundamental objectives of reducing addiction and deaths. With so many players and data sources, today’s information is partial, fragmented, and often not actionable. We don’t have the data to understand what’s happening, to adjust policy, and to motivate physicians and patients to change their behaviors. Better data and analytics can help develop better treatment protocols, both for pain in the first place and for remediation when patients are becoming dependent on the drugs.
Tags : 
    
SAS
Published By: Lumension     Published Date: Jan 18, 2013
In this webcast learn why Randy Franklin Smith from Ultimate Windows Security stands up for group policy as the "right" way to configure the bulk of workstation security settings.
Tags : 
compliance, security, policy, group policy, access control, security management, desktop management
    
Lumension
Published By: IBM     Published Date: Aug 07, 2012
Leading companies applying? Predictive intelligence? To proactively mitigate and manage complexity-fraught risks, while bringing value to their bottom line and their brand.
Tags : 
combating, combat, risk, predictive, intelligence, companies, applying, proactively
    
IBM
Published By: VASCO     Published Date: Jul 12, 2012
In recognizing the evolution of the authentication market and the demand for more convenient, portable, and cost-effective methods of adding security to all online applications, VASCO has embarked on a mission to add authentication on any platform, at any time, for any application. Read more to find out how to transform multi-factor authentication from "something you have" to "something you already have."
Tags : 
vasco, cloud computing, technology, saas applications, authentication, security, access control, security policies
    
VASCO
Published By: SafeNet     Published Date: Jun 04, 2013
To learn more about the current state of the data breach epidemic and how to implement a strategy to prevent it, read SafeNet's Secure Breach Manifesto.
Tags : 
data breach, data security, it security
    
SafeNet
Published By: VMTurbo     Published Date: Oct 25, 2013
Your business is complex. And although Big data promises to manage this complexity, the technology services that run your business are also complex. It is possible to combat this complexity with IT analytics. Read this report to learn how IT analytics that turns big data efforts inward can effectively manage the technology services that run your business.
Tags : 
forrester, vmturbo, big data, analytics, it analytics, it infrastructure, operations, technology services
    
VMTurbo
Published By: NAVEX Global     Published Date: Nov 18, 2013
This checklist will enable you to target the features and functionality you really need before embarking on the path to securing your third party relationships.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance
    
NAVEX Global
Published By: AWS     Published Date: Jun 20, 2018
The notion of digitizing your business has become a matter of “when,” rather than “if.” For many, migrating critical workloads to the cloud is a key part of this transformation. When deciding on a cloud provider, however, IT executives are under pressure to find a solution that enables reduced costs, greater agility, and above all, the ability to innovate core business processes. At the heart of many businesses embarking on this journey is their SAP environment. But since SAP workloads represent some of the most critical and deeply integrated business applications, IT executives are required to look for ways to execute this migration in the most timely and reliable manner. Organizations migrating to the cloud cannot risk application downtime or productivity loss
Tags : 
    
AWS
Published By: Cyphort     Published Date: Jun 28, 2016
Thanks to its convenience, online shopping has become a major trend over the last few years and lets face it, it’s here to stay. With the rise of online shopping, marketing experts capitalized on this new avenue to advertise their products. Now your friends nudge you on Facebook to buy a product they love and Google suggests a friendly place across the street where you can get your car fixed. It’s become hard to browse even a few pages without running into an ad and because of this increases, malware experts also saw a new avenue of attack - Malvertising.
Tags : 
downloads, best practices, network management, solutions, technology, advertising
    
Cyphort
Published By: Canon Solutions America     Published Date: Oct 17, 2017
Transforming government processes starts with laying the right foundation for your organization’s workflow. Many government agencies have embarked on transformation initiatives; however, there is still room for improvement to build a more stable transformation foundation.
Tags : 
pii security, pii breach, pii compliance checklist, how to protect pii, pii information security, pii data compliance, pii data protection, pii data breach
    
Canon Solutions America
Published By: Kellogg School of Management     Published Date: Jan 08, 2018
Kellogg Executive Education offers custom and open-enrollment courses to improve leadership, strategic and tactical skills and develop cross-functional understanding of their organizations.
Tags : 
kellogg school of business, mba, master of business administration, business degree, continuing education, business leaders, employee performance, employee performance management
    
Kellogg School of Management
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search